Automotive Cyber-security: Detection Technique of Masquerade Attacks for the Bus Network
WEI Hongqian1,2,3, SHI Peicheng4, ZHANG Youtong1,2
1. School of Mechanical Engineering, Beijing Institute of Technology, Beijing 100081; 2. Key Laboratory of Low Emission Vehicles in Beijing, Beijing 100081; 3. Vehicle Measurement, Control and Safety Key Laboratory of Sichuan Province, Chengdu 610039; 4. School of Mechanical Engineering, Anhui Polytechnic University, Wuhu 241000
WEI Hongqian, SHI Peicheng, ZHANG Youtong. Automotive Cyber-security: Detection Technique of Masquerade Attacks for the Bus Network[J]. Journal of Mechanical Engineering, 2024, 60(10): 476-486.
[1] 杨俊儒,褚端峰,陆丽萍,等. 智能汽车人机共享控制研究综述[J]. 机械工程学报,2022,58(18):31-55. YANG Junru,CHU Duanfeng,LU Liping,et al. Review on human-machine shared control of intelligent vehicles[J]. Journal of Mechanical Engineering,2022,58(18):31-55. [2] SIEGEL J,ERB D,SARMA S. A survey of the connected vehicle landscape—Architectures,enabling technologies,applications,and development areas[J]. IEEE Transactions on Intelligent Transportation systems,2017,19(8):2391-2406. [3] 于赫,秦贵和,孙铭会,等. 车载CAN总线网络安全问题及异常检测方法[J]. 吉林大学学报(工学版),2016,46(4):1246-1253. YU He,QIN Guihe,SUN Minghui,et al. Cyber security and anomaly detection method for in-vehicle CAN[J]. Journal of Jilin University (Engineering and Technology Edition),2016,46(4):1246-1253. [4] Upstream security's 2020 global automotive cybersecurity report[EB/OL]. [2023-05-04]. https://upstream.auto/upstream-security-global-automotive-cybersecurity-report-2020/. [5] RING Tim. Connected cars–the next targe tfor hackers[J]. Network Security,2015,11:11-16. [6] NIE Sen,LIU Ling,DU Yuefeng. Free-fall:Hacking tesla from wireless to CAN bus[J]. Briefing,Black Hat USA,2017,25:1-16. [7] LIU Yucheng,WU Hao,LI Xiangxue. Another look at the connection between can signal ringing & in-vehicle ecu identification[C]//2021 IEEE 20th International Conference on Trust,Security and Privacy in Computing and Communications (TrustCom). Shenyang:IEEE,2021:1021-1030. [8] WEI Hongqian,AI Qiang,ZHAO Wenqiang,et al. Real-time security warning and ecu identification for in-vehicle networks[J]. IEEE Sensors Journal,2023,23(17):20258-20266. [9] ROSENSTATTER T,SANDBERG C,OLOVSSON T. Extending autosar's counter-based solution for freshness of authenticated messages in vehicles[C]//2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). Kyoto:IEEE,2019:1-109. [10] BELLA Giampaolo,BIONDI Pietro,COSTANTINO Gianpiero,et al. CINNAMON:A module for AutoSAR secure onboard communication[C]//2020 16th European Dependable Computing Conference (EDCC). Munich:IEEE,2020:103-110. [11] LEE Hyunsung,JEONG Seong,KIM Huy. OTIDS:A novel intrusion detection system for in-vehicle network by using remote frame[C]//2017 15th Annual Conference on Privacy,Security and Trust (PST). Alberta:IEEE,2017. [12] KUWAHARA T,BABA Y,KASHIMA H,et al. Supervised and unsupervised intrusion detection based on can message frequencies for in-vehicle network[J]. Journal of Information Processing,2018(26):306-313. [13] CHO K T,SHIN K. Viden:Attacker identification on in-vehicle networks[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Melbourne:IEEE,2017:1109-1123. [14] ZHOU Jia,XIE Guoqi,ZENG Haibo,et al. A model-based method for enabling source mapping and intrusion detection on proprietary CAN bus[J]. IEEE Transactions on Intelligent Transportation Systems,2023,24(11):12922-12932. [15] FORUHANDEH M,MAN Yanmao,GERDES R,et al. SIMPLE:Single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks[C]//Proceedings of the 35th Annual Computer Security Applications Conference. San Juan Puerto Rico:IEEE,2019:229-244. [16] CHOI W,JO H J,WOO S,et al. Identifying ecus using inimitable characteristics of signals in controller area networks[J]. IEEE Transactions on Vehicular Technology,2018,67(6):4757-4770. [17] CHOI W,JOO K,JO H J,et al. Voltageids:Low-level communication characteristics for automotive intrusion detection system[J]. IEEE Transactions on Information Forensics and Security,2018,13(8):2114-2129. [18] NING Jing,LIU Jiajia. An experimental study towards attacker identification in automotive networks[C]//2019 IEEE Global Communications Conference (GLOBECOM). Hawaii:IEEE,2019:1-6. [19] POPA L,GROZA B,JICHICI C,et al. ECUPrint—Physical fingerprinting electronic control units on CAN buses inside cars and SAE j1939 compliant vehicles[J]. IEEE Transactions on Information Forensics and Security,2022,17:1185-1200. [20] ZHOU Jia,JOSHI P,ZENG Haibo,et al. Btmonitor:Bit-time-based intrusion detection and attacker identification in controller area network[J]. ACM Transactions on Embedded Computing Systems (TECS),2019,18(6):1-23.